Cybersecurity Threat Vectors and Mitigation